Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/122923?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/122923?format=api", "purl": "pkg:rpm/redhat/pidgin@2.6.6-32?arch=el5", "type": "rpm", "namespace": "redhat", "name": "pidgin", "version": "2.6.6-32", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33761?format=api", "vulnerability_id": "VCID-1p3d-b4v1-6fdg", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6477.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77124", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77138", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77176", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479", "reference_id": "1056479", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056479" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6477" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1p3d-b4v1-6fdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33767?format=api", "vulnerability_id": "VCID-1x1f-8ujk-53fw", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71702", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71706", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71765", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481", "reference_id": "1057481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057481" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6484" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1x1f-8ujk-53fw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33769?format=api", "vulnerability_id": "VCID-3zuy-sufn-tfcw", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6487.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88236", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88259", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88263", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88283", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88289", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88301", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88306", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88304", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88321", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88326", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88329", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88339", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88355", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03908", "scoring_system": "epss", "scoring_elements": "0.88367", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489", "reference_id": "1057489", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057489" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://security.gentoo.org/glsa/201508-02", "reference_id": "GLSA-201508-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201508-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" }, { "reference_url": "https://usn.ubuntu.com/2101-1/", "reference_id": "USN-2101-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2101-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6487" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zuy-sufn-tfcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33765?format=api", "vulnerability_id": "VCID-562h-uev3-nqby", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6482.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72969", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72989", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.72965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73002", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.7302", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73065", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73097", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73107", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73105", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73099", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00743", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913", "reference_id": "1056913", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056913" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6482" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-562h-uev3-nqby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33756?format=api", "vulnerability_id": "VCID-5bxz-xddd-rudq", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6152.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78602", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78415", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78452", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78437", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78468", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78474", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78496", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78491", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78531", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78547", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78562", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01147", "scoring_system": "epss", "scoring_elements": "0.78586", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473", "reference_id": "1056473", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056473" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-6152" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bxz-xddd-rudq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33766?format=api", "vulnerability_id": "VCID-5k78-mks2-ckdk", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6483.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75031", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7504", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75108", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75086", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75075", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.7511", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75149", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75166", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75194", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00863", "scoring_system": "epss", "scoring_elements": "0.75218", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978", "reference_id": "1056978", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056978" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6483" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5k78-mks2-ckdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33772?format=api", "vulnerability_id": "VCID-6gvz-3ye8-zyen", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0020.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.8763", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87658", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87669", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87664", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87677", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87674", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87697", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87696", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87711", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87726", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03531", "scoring_system": "epss", "scoring_elements": "0.87744", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502", "reference_id": "1057502", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057502" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-0020" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6gvz-3ye8-zyen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33764?format=api", "vulnerability_id": "VCID-b8zp-g4xa-t7ad", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6481.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.76992", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77021", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77002", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77045", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77052", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77088", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77089", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77082", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77124", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77138", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77146", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77176", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01006", "scoring_system": "epss", "scoring_elements": "0.77197", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908", "reference_id": "1056908", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056908" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6481" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8zp-g4xa-t7ad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33771?format=api", "vulnerability_id": "VCID-ebg2-bj5n-tycb", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97251", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97257", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97264", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9728", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97283", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97286", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.9729", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.38978", "scoring_system": "epss", "scoring_elements": "0.97299", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498", "reference_id": "1057498", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057498" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6490" ], "risk_score": 0.2, "exploitability": "0.5", "weighted_severity": "0.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ebg2-bj5n-tycb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33763?format=api", "vulnerability_id": "VCID-jb3a-ydyh-sfft", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71584", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.7167", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71652", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71702", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71706", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71711", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71697", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00683", "scoring_system": "epss", "scoring_elements": "0.71765", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907", "reference_id": "1056907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056907" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6479" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jb3a-ydyh-sfft" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33768?format=api", "vulnerability_id": "VCID-stm8-xdkh-7bdf", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71848", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71857", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71887", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71934", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71918", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71968", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71965", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71957", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71992", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.72022", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484", "reference_id": "1057484", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057484" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6485" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stm8-xdkh-7bdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33770?format=api", "vulnerability_id": "VCID-tsth-71zg-n3g7", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6489.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73244", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73217", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73267", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73292", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73308", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73316", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73343", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73356", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73354", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73349", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73376", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73399", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490", "reference_id": "1057490", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1057490" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6489" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsth-71zg-n3g7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33762?format=api", "vulnerability_id": "VCID-wprn-gtbj-ukgf", "summary": "Multiple vulnerabilities in Pidgin may allow execution of arbitrary\n code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86751", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86762", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86781", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86778", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86798", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.8682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86816", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86812", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86828", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86832", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86831", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86848", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86854", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86855", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86878", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86897", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03105", "scoring_system": "epss", "scoring_elements": "0.86914", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904", "reference_id": "1056904", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1056904" }, { "reference_url": "https://security.gentoo.org/glsa/201405-22", "reference_id": "GLSA-201405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201405-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0139", "reference_id": "RHSA-2014:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0139" }, { "reference_url": "https://usn.ubuntu.com/2100-1/", "reference_id": "USN-2100-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2100-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-6478" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wprn-gtbj-ukgf" } ], "fixing_vulnerabilities": [], "risk_score": "1.8", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/pidgin@2.6.6-32%3Farch=el5" }